Operation Josephine B: Sabotage of Pessac Power Station in France. June 1941

One of the transformers destroyed during the attack (German Federal Archives)

In May 1941 the Special Operations Executive (SOE) received a request to sabotage the power station in Passaic near Bordeaux but the French Section had no agents available: most had already been deployed to France on various operations and others were still being trained at the school for advanced industrial sabotage in Hertfordshire. SOE HQ then approached the Polish Section (EU/P) which came under the jurisdiction of the Polish Government in Exile in London, and after agreeing to undertake the mission six Polish volunteers boarded a converted Whitley bomber of No.138 Special Duty Squadron at RAF Tempsford to infiltrate France by parachute.

Shortly after entering French air space the aircraft suffered an electrical fault which caused their container loaded with weapons and explosives to be jettisoned over the Loir and were forced to abandon their mission and return to England. Unbeknown to the aircrew the electrical fault was far more serious than first thought and eventually caused the aircraft to crash land and catch fire at RAF Tempsford: all the crew were either killed or injured and the six Polish agents suffered serious burns.

SOE HQ then asked RF Section (the Free French equivalent to SOE under General de Gaulle) whether they were willing to attack the power station and after de Gaulle agreed, on the night of 11-12 May 1941 three agents from RF Section, J Forman, Raymond Cobard and André Vernier (aka Jacques Leblanc) successfully infiltrated France by parachute.

After hiding their weapons and explosives the team reconnoitred the power station: there was a high-tension cable very close to the top of a 9-foot wall they needed to climb over and it appeared there was a large number of German and Italian soldiers protecting the power station. They also failed to obtain the bicycles they intended using for the getaway so decided to postpone the attack.

Before leaving England Forman was given the Paris address of an RF agent called Joêl Letac who remained in France after a failed mission called Operation Savanna, the elimination of Luftwaffe Pathfinder crews whilst they travelled by coach to their airfield, and after meeting Forman Letac encouraged him to continue the mission and the following day Letac travelled with the sabotage team to the power station. After the old lorry they obtained broke down they continued the remainder of the journey on stolen bicycles and eventually recovered the equipment they had buried around 100 yards from the power station.

On the night of 7-8 June 1941 during pitched darkness due to the blackout Forman climbed the perimeter wall and crawled under the high-tension cable which was dangerously close. After ensuring he could not be seen by the guards Forman entered the compound and opened a side door, the rest of the team entered the grounds of the power station and then sprinted across open ground to the main building.

In less than thirty minutes the team placed magnetic incendiary devices on eight large electricity transformers and then made their getaway on the stolen bicycles. It has been said the explosions were so violent flames rose high into the air and illuminated the entire area and searchlights started probing the sky for bombers.

Seven of the transformers were destroyed and this seriously disrupted the Bordeaux submarine base, numerous factories used to supply the German military were forced to stop production for several weeks. The electricity grid from another region was diverted but the overload caused more damage and all electric trains in south western France had to be replaced with steam locomotives, and all the transformer oil in France was used during the repairs.

Some writers claim the team was picked up by a RAF Lysander of 161 Special Duty Squadron, but this was not the case. The team arrived in France with one million francs (said to be about £1,400 in 1941 and roughly £71,000 in 2021) and the money was unaccountable! Instead of requesting an extraction they remained in France for a further two months and according to historian MRD Foot “They left behind them broken glass and broken hearts” before escaping to England via neutral Spain. Before they crossed the frontier Cabard was captured but later escaped and returned to England.

Why do we continue to lose the Information War against Daesh and al-Qaeda Affiliates? (First published 3 March 2016)

Daesh2

Understanding and harnessing the persuasive powers of narratives is central to US and international counter-terrorism efforts. There is an urgent need to understand the narrative tactics of terrorist recruitment and equal if not greater need to destabilize the weakness of those narratives.” (Ajit Maan PhD, Narrative Strategies: Counter Terrorism http://www.ajitkaurmaan.com/books-and-articles.html)

Since 9/11 we have seen increasing sophistication in the use of narratives by al- Qaeda, its affiliates, and especially by Daesh, to shape the minds of their international audience.  Well scripted secular narratives often illustrated by skilfully edited visual images drive home the message to young people that they are being oppressed by the western world- the west is inherently racist and all their experiences: lack of work and education opportunities, marginalization and all social problems, both real and imagined, are because of the corrupt western governments which is being supported by Christian-Jewish elitism.  

Secular narratives are designed to create a culture of blame towards the western nations and those outside their peer group.  Religious narratives, or to be more precise the extremist’s version of Islam, provide not only strong moral justification for violent Jihad but also provides a peer-group of like-minded individuals willing to use violence to address their perceived grievances. The occasional outbursts of resentment from an individual has been transformed into collective action to violently challenge the status quo.

Once an individual has been suitably spoon fed with the urgent need to act, violent Jihad is far easier to sell as a religious duty. The cognitive effects of the combination of secular and religious narratives closely fit Jerome Bruner’s (American psychologist) concept of ‘Narrative Construction of Reality.’ It may also be described as ‘Narrative Based Knowledge’ (Nicolas Szilas).

Although narrative analysis (narratology) can be complex, in principle we can break it down into Emotions, Motivation and the mobilization of Action.

black

An example of Daesh attempting to increase civil unrest in the USA and promoting the illusion of the Islamic State embracing equality among all races.

Narratology (the analysis of narratives in their many forms)

Since the 1960’s Narrative theorists have always shown interest in the relation between minds and narratives, or to put it another way, the cognitive effects of narratives.  Although many argue that Narratology was starting to be regarded as an important area of research during the 1960s, throughout the 1960s and well into the 1990’s this research was being conducted by scholars from a wide variety of disciples which included: Social Anthropologists, Philosophers, Social Historians, Psychologists and Sociologists. Each disciplined tended to work in isolation resulting in their findings, the development of concepts and analytical tools not being shared with other disciplines and there were no peer-group reviews from outside their profession.  I am pleased to see that Narrative Strategies (http://www.narrative-strategies.com/) has started to address this major shortcoming by establishing an increasingly influential public platform consisting of a coalition of scholars and military professionals involved in the non-kinetic aspects of counter-terrorism, irregular warfare, and social conflict.

When attempting to analyse narratives from Daesh and AQ affiliates we find ourselves attempting to identify how these various narratives are designed in order to “construct reality” for a specific audience.  Only then is it possible to construct a workable counter narrative. Furthermore, an added difficulty is due to the fluidity of the narratives used by Daesh and AQ. These organisations closely monitor all government communications, the media and pay close attention to international affairs and western military initiatives. They look for every opportunity to distort the original message to fit their propaganda objectives. 

peiople caliphate

A simple example which has been much quoted occurred shortly after 9/11 when George W. Bush said, “this crusade, this war on terrorism is going to take a while…”  within hours the word ‘Crusade’ was used to project the image of America being the aggressor against Islam. They received a further propaganda opportunity after columnist Alexander Cockburn, suggested in the Counter Punch magazine, that Bush was referring to the “Tenth Crusade” in which he numbered America’s War on Terrorism to follow the nine medieval crusades between 1095 and 1272.  As Bush used the word ‘crusade’ and an American publication ‘confirmed’ the USA was going to continue the medieval European crusade against Islam this was not only used as confirmation that America was bent on destroying Islam, 9/11 was also portrayed as being ordained by God! As can be seen by this example of one word resulting in a huge propaganda victory which was used for moral justification for terrorism, recruitment and proof that Jihad against America and its western allies was the duty of all Muslims, most government communications which lack close scrutiny may be used for propaganda purposes simply through careful manipulation based on cultural and social interpretations; and the distortion of the original message to support the extremist mythology based on their view of an unjust and un-Godly world in which the west continues to be responsible.

The current threat from international terrorism cannot be addressed by conventional and SOF alone and the use of soft power, for example, the ability to shape the preferences of others through appeal and attraction, are essential for countering this new terrorist phenomenon based on ideology and destruction.

I agree with Paul Cobaugh who says, “The US soft power tool box is half empty and poorly stocked…  we are employing an ineffective, ambiguous, antiquated strategy and there is a limited number of true, trained craftsmen…”

(Paul Cobaugh, Soft Power on Hard Problems (forthcoming) ed. Ajit Maan, Ph.D. and Brig. (retired) Amar Cheema.)

I would add, this is not just a US problem, all western nations share the problems addressed by Paul Cobaugh.   Again, I also agree with Paul Cobaugh’s assertion that “Daesh is a media influence effort supported by arms and brutality rather than the other way around” and “We require sophisticated media campaigns in the media and on the ground…”

Due to the powerful and fluid nature of the plethora of Daesh narratives I also agree with Paul Cobaugh’s view that those responsible for government or military communications must be capable of thinking out of the box and we must also utilize the media, diplomacy, business development etc. This multi-faceted approach which Paul Cobaugh discusses in great detail, are clearly essential for establishing workable and fluid counter narratives both inside theatres of operations and also to address secular and religious narratives which continue to be powerful recruiting tools especially when it comes to valuable men and women living in the west and also provides opportunities for the development of the ‘self-radicalized’ and so-called lone wolf attacks.   

Furthermore, any efforts in the form of refugee aid and stability development, irrespective of whether this is a government or NGO initiative should be widely promoted. (See Ian Bradbury, Narrative Strategies http://www.narrative-strategies.com/)  Humanitarian work of this nature helps counter the narratives depicting western nations being led by the epitome of evil (the United States) and the Christian- Jewish alliance to crush Islam.

The Digital Culture: Finding and analysing the continuous flow of Narratives.

ask fm

Apart from analysing narratives with the intention of countering their message or story, such analysis may also provide information on the target audience, the writer and his/her intentions and this is especially true with western audiences. Of particular interest is language syntax- informal speech patterns, country or regional variations, jargon, teen idioms and expressions, Pidgin English etc. However, an increasing problem is finding the narratives to analyse in the first place. 

It is well known that Twitter, Facebook and YouTube continue to be used by Daesh and AQ affiliates for the dissemination of propaganda and are also used for recruitment. It is also known that as soon as these accounts come to the attention of network monitors they are deleted but only to be replaced by large numbers of new accounts which are often linked to disposable email accounts.  Furthermore, some accounts may deliberately use expressions which are not connected with extremism or religion in order to avoid detection and subsequent suspension of the account.

In 2013 I said, in ‘Narrative: Pathways to Domestic Radicalization and Martyrdom’, every effort is being made to recruit technical-jihadists and IT professionals specializing in security should not be complacent by believing they are the smartest people in their field. Some of my IT contacts remained adamant: they held graduate and post graduate degrees and had far greater knowledge and experience than any terrorists. Since then we have seen an increasing degree of cyber sophistication and media manipulation from Daesh technical jihadists.

Although Daesh continue to use multiple Twitter, You Tube and Facebook accounts and easily form new accounts to replace those which have been removed, these and other mainstream social media networks are now mainly used as conduits to steer willing audiences and potential recruits to more secure networks which us various forms of encryption and the choice of network is sometimes used to target a particular geographical area.

channel

Blackberry Channel

Blackberry’s media platform, ‘Channel’, according to IBRANO, have over 1 million channels which can only be accessed through Blackberry Messenger and users can start channels covering topics of their choice. The Al-Hayat media wing of Daesh, who publish the Dabiq Magazine, have been found using the Blackberry Channels.  According to ARS Technica, Channel is used to target an English speaking audience and is regarded as a versatile recruiting tool which Daesh regards as far more effective and more secure than their estimated 46,000 Twitter accounts (ARS Technica).

Dabiqinspoire

In 2015, the BBC reported that “new platforms are popping up on a weekly basis in order to get away from mainstream social media platforms and to hide in corners…” (BBC Trending, 13 March 2015)

We now find that many of the narratives we need to address along with the planning of attacks, recruitment information, bomb making instructions; ideological literature, advise on how to engage in so-called lone wolf attacks against soft targets, and other instructional, motivational material and advice, is being sent to willing audiences and the fully radicalized via secure mobile messaging apps some of which have been designed by technical jihadists.

Telegram, which is described as a cloud-based instant messaging service for both mobile (Android, iOS, Windows Phone, Ubuntu Touch) and desktop systems (Windows, OS X, Linux) allow users to send messages and exchange photos, videos and files of any format up to 1.5 GB in size and has extensively been used by Daesh and AQ Yemen (AQAP). This was a natural choice simply because Telegram provides optional end-to-end encrypted messaging with self-destruct timers. According to promotional material it is “Pure instant messaging — simple, fast, secure and synced across all your devices and has over 100 million active users.”

For Daesh, Telegram provides two major security requirements. Firstly, it has been widely said Telegram does not disclose where it rents offices or which legal entities it uses to rent them, citing the need to shelter the team from unnecessary influence and protect users from governmental data requests. Secondly, it is also widely claimed that once the self-destruct timers have been activated and all data has been deleted no data can be recovered using forensic software.  Naturally, both claims are open to debate. 

Telegram and other encrypted apps are also used to distribute their publication ‘Inspire’ which concentrates on training and their glossy magazine Dabiq which has a strong media brand and is designed for the dissemination of ideological congruent propaganda to promote radicalization among sympathizers and foreign fighters mainly from the English speaking nations.

Daesh also maintain their electronic presence and distribute their narratives by adopting per-to-peer technology.  For instance, anonymous peer-to-peer networks such as Ask.Fm was used for one-to-one interaction, and the distribution of information on how to join Daesh.

It is also known that Firechat app has been utilized for covert planning of coordinated attacks and also for international recruitment.

According to the Office of University Programs and Technology Directorate, US Department of Homeland Security, in December 2014, “After profiling this group’s {Daesh} use of cyber technology for over a year they found the use of a variety of technical platforms, diverse languages and tailored messages… cyber technologies also facilitate internal co-ordination (e.g. Command and control) and focused information flow externally with the broader Umma {the whole community of Muslims bound together by ties of religion} and potential foreign fighters.”

This paper also explains Daesh has a sophisticated understanding of cyber marketing, organisational branding and has robust and a fluid recruitment arm and highlights the kind of personal information they can access.

Apart from the intelligence and security implications associated with encrypted communications over several platforms it also presents a series of hurdles we must overcome before we can counter the stream of narratives from Daesh and the various AQ affiliates. 

slave

Daesh using race to promote the ‘virtue’ of their ideology.

The Virtual Caliphate: Daesh and Their Use of Social Media (First published 2 May 2016)

Daesh

 

The Islamic State, widely known by opponents as Daesh, has proved itself to be an innovative organisation skilfully using technology and inventive methods to manipulate users of social media and compelling global news networks to run their stories. The methods they employ to radicalize without physical contact and the relationship between individual radicalization and the consumption of extremist material which, by its very nature involves a complex mix of variables, continues to evolve. Consequently, a detailed examination of the Virtual Caliphate is beyond the scope of this paper and the following is intended as a brief introduction to the subject.

2

According to Hemelin, attitudes are part of the brain’s associated networks; people interact with the environment based on how they perceive and interpret it. This is, people form an internal (cognitive) map of their external (social) environment and these perceptions rather than objective external reality determine their behaviour. Persuasive media messages, in this case social media, are built on the premise that behaviour follows attitude, and attitude can be influenced by the right message delivered in the right way. (Trigger Factors of Terrorism: Social Marketing as a Tool for Security Studies, Nicolas Hemelin, Al-Akbawayn University, Morocco)

Likewise, world events and social issues, both real and imagined, are beacons by which a person forms a cognitive map of one’s environment from which an interpretation of reality is formed.  Furthermore, in the case of extremist narratives of hate and retribution, these do not act in a vacuum, they must be accompanied by supporting ideas to reinforce the belief so the target audience becomes detached from reality. 

The technically astute and media savvy Islamic State’s (Daesh), official messages on social media are supported by several thousand sympathizers and followers, called ‘fan boys’, who regularly re-circulate official content from Daesh propagandists. In the case of Twitter, to greatly increase the coverage of their extremist messages a hashtag campaign was organised. This simply entailed hijacking popular hashtags such as those related to major sporting events to promote links to extremist websites where anyone can anonymously post messages and upload images. Daesh also created their own app, ‘Dawn of Glad Tidings’ to efficiently tweet messages to followers.

Although the accounts of extremist organisations continued to be closed and their material removed from social media platforms, this group, like other extremist movements, remain flexible and resilient. After an account has been closed other accounts are created and quickly publicized via various links and websites. ISIS also maintains a large number of backup accounts and continues to identify more social media platforms to increase their digital presence.

An estimated 10 million people live in Daesh occupied territories (BBC Islamic Group Crisis and maps, 27 April 2016) which is a closed world with no journalists or independent observers. The only source of information for the world’s media originates from the Daesh media center called Hayat which has offices throughout the occupied areas and is controlled by the Media Council. Different areas of propaganda are managed by different departments within the Council and before being released all communications are structured to meet a variety of requirements. This includes ensuring the global media use their content so their messages and visual images gain access to millions of homes.  Official communications from Daesh is greatly supplemented by unofficial material uploaded to social media and websites by their supporters.

The glossy and professionally produced Dabiq magazine, which is translated in English, French and German and is available via the Internet, is thought to be written by professional journalists in occupied areas who were given the option of either working for Daesh or be killed.

Virtual world

The virtual world

Daesh and other VE narratives found on social media and various websites cover a number of separate themes which may be woven together in order to appeal to a certain audience or to encourage an appropriate emotional development. This is essential for the successful engagement and radicalization in virtual space which differs from real-world face-to-face radicalization.  According to Von Behr, whose research is based on the conviction of 15 extremists, “the Internet affords more prospect for radicalization… {the internet} was a key source of information, communications and propaganda for their extremist beliefs… {it} also provided greater opportunity than offline interaction to confirm existing beliefs…”

Research conducted by et Al, in 2014, found that after sampling 199 lone actor terrorists, 35 percent of the sample virtually interacted with a wider network of activists and 46 percent learned aspects of their attack methods through virtual sources. They also found that 65 percent of al-Qaeda inspired actors were significantly more likely to learn through virtual sources.

Forms of virtual interaction include: reinforcing prior beliefs, seeking legitimacy for future actions, disseminating propaganda and providing material support for others, attack signalling, and attempts to recruit others (Gill and Conway,2015).  Forms of virtual learning include, ideological content, opting for violence, choosing a target, preparing an attack and overcoming hurdles.

It is also evident that Daesh and other terrorist movements use the Internet to create a ‘brand image’ to assist them in marketing their ideology, recruitment and influencing media coverage.

There is also what Gill and Corner call, ‘Current Problem Factors,’ “World events and newspapers provide the heads-up about the dangers of the world and opportunities related to one’s degree of concern towards world events…” and these concerns are exploited through the use of appropriate narratives. (What are the Roles of Internet Terrorism? -Measuring online behaviors of convicted UK Terrorists, Paul Gill, University College London, Maura Conway Dublin City University, 2015)

The full spectrum of narratives produced by Daesh is large: some are interrelated and link various secular and religious beliefs, whilst others provide ‘evidence’ supporting the extremist’s views. 

Common themes include: sociological and political, agitation and integration, extreme violence, mercy, victim and blame, war/Jihad; utopia democracy and apocalyptic.

Sociological and political narratives

Sociological narratives, which are often used in tandem with political narratives, may include poetry, visual images and ‘personal’ stories to help maintain the illusion of Daesh’s self-styled caliphate being a democratic utopia. Whilst the political narratives may be paired with tactical and strategic narratives promoting emigration to the Caliphate; attempts to sell the belief of being the duty of all Muslims to support the Caliphate and the need for the birth of children for the Caliphate to grow, prosper and provide the next generation of jihadists known as ‘cubs. ‘

Strategic Narratives                                                           

Strategic narratives have long-term goals and seeks to establish and maintain the organisational line of ambiance (Quillian Foundation). The content may appear largely mundane and insignificant: stories and visual images of children playing in the streets, various social events, shrines being destroyed; western style clothes, make up and western consumer goods being burnt. As well as further enforcing the message of utopia, it is also designed to project the image of the ‘Islamic purity’ of the Caliphate and rejection of western values and culture.

Agitation and Integration Narratives

Agitation narratives are intended to encourage passive supporters to become active members of the organisation. Active membership includes the recruitment of foreign fighters or joining their support structure as technicians, logistics specialists, being responsible for organizing safe houses and documents etc. Integration narratives are designed to encourage loyalty to the system of beliefs promoted by Daesh. Again, Agitation and Integration narratives are often paired or work in tandem for optimum effect on the target audience.

Rational and Irrational Narratives

Rational and irrational narratives are frequently used to distort facts (disinformation) and are mainly used as persuasive tools to reinforce the message of the movement’s superiority and the image of a utopia which must be defended at all costs. Furthering the synthesis of lies, exaggerations and facts are essential for the survival and growth of Daesh and its caliphate. None of the various themes are discrete elements within the narrative strategy: sociological, political, rational and irrational narratives may be used separately or in combinations to spoon-feed their selected audience.

Extreme Violence

Extreme violence may be regarded as the vanguard element of the various narratives which encourages beliefs such as vengeance; supporting the self-proclaimed ‘Islamic’ superiority of Daesh and justifying revenge on behalf of all Sunni Muslims against the Christian-Jewish crusaders and other unbelievers. Within the long list of unbelievers, we also find Sunni Muslims who refuse to follow the organisation’s religious ideology and world views. As with all narratives and propaganda strategies the content and structure is often tailored for specific purposes.

In November 2014, the Daesh media centre produced a video that documented the execution of three members of the Syrian Army and this was intended for a different audience than the one in which Japanese journalist Kenji Gotto was killed. The video of the barbaric execution of Kenji Gotto contained the caption “A Message to the government of Japan”.  We have also frequently seen executions of alleged spies as part of a terror tactic to discourage dissent from the population under Daesh control in Iraq and Syria.

The promotion of extreme violence is also used for the self-gratification of supporters; to intimidate enemies; and to provoke outrage from the global media to ensure further publicity opportunities.

Mercy Narratives

Mercy narratives often work in tandem with extreme violence and are connected with repentance to God and Daesh. An example often quoted is the April 2015 video entitled “From Darkness to Light”. Here we see captured combatants from the Free Syrian Army, Jabhat al-Nusra and the Syrian Army who were all former enemies of Daesh. The carefully orchestrated and professionally edited video shows them reneging their former ‘Islamic’ beliefs and swearing allegiance to Daesh. According to this propaganda video, Daesh is compassionate and will forgive their enemies if they follow the ‘true’ path of Islam and swear allegiance to Daesh and the Caliphate.

Victim Narrative

Victim narratives designed to encourage paranoia is a constant theme and a powerful recruiting tool. This promotes the belief of the global war to destroy Islam and this narrative and propaganda tools are often used alongside extreme violence. For example, Jordanian pilot, Mudh al-Kasabeth who was burnt alive shows the binary opposites of victim and extreme violence.

On 3 February 2015, Daesh produced the video “Healing of the believers Chest” the words ‘healing’ and ‘believer’ are positive words which suggest beneficial treatment! However, this is the title of the video documenting Mudh al-Kasabeth standing in a steel cage before being doused with petrol and burn alive. Shortly after the Jordanian pilot was engulfed in flames, footage of coalition airstrikes was faded in before showing dead children ‘allegedly’ killed during the airstrikes. This video was intended to reinforce the justification narrative, and to remind its audience of the legitimacy of retaliation and the duty of all Muslims to join jihad. The caption at the end of the video, “What is the ruling on burning Kafir until he dies, Office of Research of Fatwas, 20 January 2015,” was intended to provide religious justification for the murder.

Another example shows jihadists carrying dead children before showing a group of alleged ‘spies’ being burnt alive in a car and another groups of ‘spies’ being beheaded by explosive necklaces. These images were for the benefit of the global news networks who, as Daesh predicted, published still images across the world and the video was shared tens of thousands of times within two hours of being posted on social media. Images and descriptions of dead children remain a powerful driver for creating a victim mentality leading to paranoia and a desire for ‘divine’ retribution by becoming a ‘soldier of God’.

War Narratives

Such narratives are intended to create and sustain the illusion of power, military discipline, valour; and feeding the idea that Daesh has a ‘real’ army, which further adds to the illusion of a ‘real’ nation state or caliphate. War narratives are also a powerful tool for recruiting foreign fighters.

Utopian Democracy

The Utopian building narrative promotes social well-being, brotherhood, sisterhood; the multi-ethnic makeup of the caliphate which embraces all colors and nationalities without prejudice and their claim, “all are equal under the Islamic State”. Daesh propagandists and their supporters take every opportunity to promote the false image of an idyllic and harmonious life under their rule. We see a constant stream of emotive stories of happy families which reinforces the myth of equality and a common identity for all Muslims living in the Caliphate.  20-year-old Aqsa Mamood, (aka Umm Layth) who was slowly radicalized by reading extremist articles and posts online in her bedroom in the UK, is believed to have played a major role in recruiting many women from the west.  As well as being a prolific blogger she also engaged in debates on Twitter and gave advice on how to join Daesh. British sisters, Zahra and Salma Halane, through social media became role models for others to join Daesh. These female groomers promoted the Utopian image of nice houses, friendship, good husbands and a shared common identity.

Through careful branding and a continuous marketing campaign the Caliphate which was created by Daesh and is said to have been ‘ordained by God’ is, for many of its supporters, inseparable from the Umma (world community consisting of all Muslims) and is the unique selling point on social media. As the majority of Daesh supporters have never visited the so-called caliphate and their only knowledge is based on the propaganda version or, to be more accurate, a ‘Cyber Caliphate’, and Daesh remains popular, this may be seen as further evidence of the persuading influence of their narratives which alter and reinforce beliefs and attitudes.

social media

Apocalyptic Narratives

The apocalyptic narrative: the continued war between good and evil and those dedicated to jihad having God and the angles on their side, remains a powerful motive for joining the ranks of the jihadists and a willingness to die for the cause. This approach also allows extremists to add additional enemies against Islam as they see fit.

Whilst western governments continue to rely on military options to address Daesh and other violent extremists and neglect the urgent requirement to employ counter-narratives which work in conjunction with a variety of other soft power options, global jihad will continue to grow. 

Further reading on narratives and soft power can be found on the Narrative Strategy blog which is the public platform of a coalition of scholars and military professionals involved in the non-kinetic aspects of counter-terrorism, irregular warfare, and social conflict.  http://www.narrative-strategies.com/

Basic Analysis of Social Media: Examining the use of narrative-based drivers for remote radicalization. (First published 3 August 2016)

Basic analysis

 

As I am fortunate to have a large number of data analysts and those involved in the behaviour sciences among my LinkedIn contacts, I would like to point out this paper is not intended to bring anything new to the study of radicalization or extremist behaviour. I also feel sure that many of my contacts in this field will put forward various other methods which may be used to collect the same datasets mentioned in this paper.

Several years ago, as part of my research into the induction and radicalization process used by AQ affiliates via social media (SM), I spent a considerable amount of time reading academic papers on SM mapping and human behaviour.  This information allowed me to research SM, the web and dark web in order to increase my understanding of the drivers associated with violent extremism (VE) and the mindsets of vulnerable people who may be psychologically manipulated to join the extremist cause. It also allowed me to examine and test new theories put forward by various academics.

The following is a basic introduction to the subject which is based on the research of others and which I have modified for my own research needs. Furthermore, due to the limited scope of this paper I have not included data associated with demography, gender; or the analysis of text and visual images which are to be found in the ‘extremists’ virtual world of their making.

Finally, although I and other members of the Narrative Strategies Team (http://www.narrative-strategies.com/) have a comprehensive understanding of the narrative based drivers associated with VE, I have found the following allows us to examine these drivers working over time and space along with the behavioural changes experienced by some members of the target audience. 

Analysing Social Media (SM networks)

Virtual social networks, like those found in the ‘real’ world, consist of relationships and relationship building blocks. An examination of this network reveals a combination of relationships which create identifiable patterns of connected people, groups and organisations.  As explained later, this virtual social network which appears to allow users to remain anonymous provides a false sense of security where members are willing to express their concerns, frustrations and other personal information which they may not be willing to discuss in the real world. This provides an indication of an individual’s vulnerabilities which may leave them open to psychological manipulation.  When one examines the communications between like mined individuals within this network it may first appear to resemble a peer-group support network which by its very nature encourages additional personal information to be shared with ‘like-minded’ people. Accordingly, extremist groomers and recruiters can select suitable individuals who may be radicalized.  

Virtual Social Networks

It is easier to regard social networks as consisting of social entities: actors, distinct individuals, groups and organisations. We must also be prepared to follow these entities as they migrate to or simultaneously use other SM platforms.  For instance, Twitter is limited to the maximum use of 140 characters (Tweets) and due to this limitation member who are of interests to extremists are often encourage to join a similar network on another SM platform with less restrictions and/or is considered more secure.  Consequently, it is not uncommon to find the same social entities on various SM platforms.

relationship ties

Relationship ties (Contacts)

Some relationships which are tied to others across the network/s are said to be ‘informal’ because they are not widely known by others entities of the network under examination.  For example, on LinkedIn we often find third degree contacts commenting on updates posted by members from outside their network simply because the commentator is connected to one or more of the writers’ first degree contacts.  Such entities, in this example LinkedIn members, are often referred to as ‘Muktiplexity’ or ‘Multiplex’ because these individuals are actors with ties to other actors connected to you. I plan to cover this concept in greater detail at a later date during my examination of Russian trolls and the information war.

The Two Node Network consists of actors who may not have direct ties with each other but they attend similar events within a community (Mosques, sports clubs etc.) or may regularly visit similar websites. Although there are no virtual or physical connections, this provides an opportunity for prominent actors (Focal Actors) to form a false rapport with members of the Two Node Network and the opportunity to form a ‘weak’ link.  The establishment of ‘strong’ links are only attempted after an individual is thought to be of interest to the extremist cause.

Egocentric, also called personal networks, tie directly with Focal actors (those with influence, I.e., groomers, recruiters, propagandists etc.) in the network.  Hanson and Shneiderman describe this as, “Social Centric or complete network consisting of the relational ties among members of a single bounded community. (Social Network Analysis: Measuring, Mapping and Modelling Collections of Connections, D. Hanson and B Shneiderman, 2010).

The examination of networks also allows us to develop what some academics call ‘name generators’ which is simply the names of social entities, in this case people, who frequently communicate with the focal actors.  Hanson and Shneiderman call those names generated by the focal actor, ‘the actors alters’.

The use of name generators, as advocated by Hanson and Shneidrman, allows for the identification of strong ties across a dense network.  To identify weaker ties in more wide ranging networks, acquaintance name generators can be used.

Another useful tool discussed by Hanson and Shneiderman, is the Positioning Generator. This allows the researcher to identify people who fill a particular ‘valued’ role or position within the network and therefore have access to a range of resources. These resources may include professional knowledge, or work related experience beneficial to an extremist group. 

Psychological Manipulation

Apart from the same narrative based drivers being used within the real and virtual world, we also find the same methods used to encourage members of their target audience to express their concerns, frustrations, aspirations and how they see themselves.  This information is used to psychologically manipulate suitable members within the network and tie them to others with similar mindsets. The linking of suitable individuals within a network will often reinforce these concerns and produce suitable conditions for physiological manipulation. A United Nations report describes this as, psychological manipulation, “to undermine an individual’s belief in certain collective social values, or to propagate a sense of heightened anxiety, fear or panic within a population or subset of the population…” (The Use of the Internet for Terrorist Purposes: United Nations Office of Drug and Crime, NY 2012) It is also widely acknowledged that certain cognitive propensities can combine to create a mindset that presents a high risk of being radicalized (see Drivers of Violent Extremism: Hypotheses and Literature Review, RUSI, 16 October 2015) and it is these propensities which extremists seek to identify within members of the network.

Social media has made social connections and networks more visible and open to research. “The internet and its use by terrorist organisations, individual members, supporters and recruits afford new avenues for assessing information about groups and their activities…” (Lorraine Bowman-Grieve, Security Informatics, 2013, 2:9) As Bowman-Grieve says, “individual reasons why people become involved are many and varied, with no single catalyst event that explains involvement.” However, research indicates that involvement is a gradual process that occurs over time and the development of this process, which is driven by narratives and supported by inter-personal bonds that have been created for this purpose, can be examined through social network analysis.

By analysing network activities over a period of time not only do we see the use of narratives as efficient drivers towards extremism, we also see the development of identities being slowly formed. This includes perceived victimization and attempts to convince individuals they are victims and linking this to a common or shared identity and the legitimization of violence to address these perceived injustices. We also see the development of dualist thinking which supports the extremist’s’ view of the world, other cultures, religions and western society. 

PDF version for downloading

 

Alan Malcher

British Forces in the Radfan 1 April 1964 to 30 June 1964: One of several forgotten conflicts.

British Paratrooper on the Radfan Moutains. (Paradata)

One of many forgotten conflicts since WW2: the Aden Emergency was an armed insurgency by the NLF and FLOSY against the Federation of South Arabia, a protectorate of Britain which is now part of Yemen. 

The 5000-foot Bakari Ridge which dominated the Wadi Dhubson was regarded as impregnable by the insurgents and accommodated their leadership. To capture the Wadi Dhubson members of 3 Para (3rd Battallion Parachute Regiment) scaled the mountain carrying 90lb loads and covered 11 miles during two-night marches and after a number of skirmishes and a large firefight they occupied the ridge on 24 May.

Radfan (Pradata)

Soldiers descended from the ridge on 30-foot ropes and surprised the insurgents and this was followed by a violent fire-fight and air attacks from RAF fighters and concentrated fire from the battalion broke all resistance and the insurgents withdrew leaving their dead and all their weapons behind. Villages were searched, and arms dumps destroyed. Within nine days 200 square miles of territory which had been an insurgent stronghold and had never been entered by Europeans was secured and place under government control and many insurgents had been killed.

(Paradata)

3 PARA withdrew back to Aden on 28th May having won a DSO, an MC and four additional medals, three MIDs and six CinC commendations. D Coy, 3 PARA were deployed on 6 June and remained behind for a further four weeks.


Canadian SOE Agents Frank Pickersgill and Ken Macalister

(An overview)

Frank Pickertsgill and Ken Macalister

Canadian SOE agents Frank Pickersgill and Ken Macalister parachuted into France on the night of 20 June 1943 with instructions to form a clandestine network called Archdeacon. As described in the previous post (see below) they were picked up by SOE agents Yvonne Rudellat and Pierre Culioli and their vehicle was stopped at a roadblock during which the Canadians were arrested, and the two other agents were captured after a shoot-out with German troops who recovered the Canadian’s wireless and codes hidden in a Red Cross parcel on the rear seat of the vehicle which allowed a German operator to play-back the wireless to London using the correct codes.

Whilst a German operator was sending favourable reports to London about the newly formed Archdeacon Circuit there was no reason for London to doubt they were receiving signals from Macalister and as requested sent weapons, finance and other agents by parachute to assist Archdeacon which, unbeknown to London, was in German hands and only after the war did the full story become known. After their capture Macalister and Pickersgill were repeatedly tortured for information and on 27 August they were transported to Buchenwald Concentration Camp.

On 14 September 1944, John Macalister, Frank Pickersgill along with several other agents were executed by slow strangulation with piano wire suspended from hooks in the crematorium at Buchenwald camp.

SOE Agent Yvonne Rudellat

Yvonne Rudellat was an SOE Courier who was involved in a number of operations and the following is an overview. On 20 July 1942 after crossing from Gibraltar by felucca under the cover of darkness she arrived by rowing boat on a deserted beach a few miles from Cannes. She used the cover name Jacqueline Gautier but used other identities whilst working for various networks. She took a train from Cannes to Lyon and from there took a train to Paris where she hid in the tender of the locomotive to cross the demarcation line. From Paris she went to Tours and worked for the Monkeypuzzle circuit where she organised agents and supplies to be dropped by parachute and also travelled by bicycle to liaise with scattered members of the resistance. After Monkeypuzzle was infiltrated by German agents she teamed up with SOE agent Pierre Culioli and took the cover of a married couple with the surname Leclaire and continued organising parachute drops.

Working as a married couple they picked up two Canadian SOE agents, John Macalister and Frank Pickersgill who arrived in France by Parachute a few hours previously. Culioli was driving the car, Yvonne was sitting next to him and the two Canadians were sitting in the back when they reached a roadblock in Dhuizon. The reason why the Canadians were ordered out of the car and why their covers were blown is beyond the scope of this post. After German soldiers ordered Rudellat and Culioli out of the car Culioli put the car in gear and accelerated away and soldiers started firing at them. They were quickly pursued by a vehicle full of German soldiers who were shooting at them and Yvonne was seen leaning out of the car window returning fire before slumping back on her seat after being shot in the head, shortly afterwards Culioli was shot in the leg and the car crashed into a wall. Yvonne was taken unconscious to Blois Hospital where doctors found the bullet had not entered her brain and decided it was too dangerous to remove the bullet. When she gained consciousness she was confused, did not know her name or understand why she was in France.

On 2 March she arrived at Bergen-Belson concentration camp during a typhus epidemic during which an estimated 20,000 prisoners died. Rudellat never recovered her memory and eight days after the camp was liberated Yvonne Rudellat died of typhus and dysentery and was buried in a mass grave along with 5000 other bodies.

French Resistance during the Battle of Vercors

A good video documentary on the Battle of Vercors from an American presenter. My only criticism is there was no mention of SOE who had been operating in the area for sometime and the OSS units he mentioned were not always required by the Maquis.